Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.🎧 Each course is divided into a series of short, focused episodes that take you from beginner to ad... more
FAQs about CyberCode Academy:How many episodes does CyberCode Academy have?The podcast currently has 212 episodes available.
November 14, 2025Course 6 - Network Traffic Analysis for Incident Response | Episode 1: Fundamentals of Networking: The OSI Model and Essential ProtocolsIn this lesson, you’ll learn about:The core networking concepts required before beginning any network traffic analysis.The relationship between the OSI model, low-level protocols, and application-level protocols, and how they shape the behaviour of traffic you’ll examine in a tool like Wireshark.How to recognize common protocol behaviours at a high level so you can later understand patterns, anomalies, and security-related findings during analysis.1. The OSI Model and the Network Stack (high-level foundation)The OSI model divides networking functionality into structured layers.Hardware-oriented layers:Physical → bits on the wireData Link → frames within a local networkSoftware-oriented layers relevant for analysis:Network (Layer 3) → packets, routingTransport (Layer 4) → reliability, portsSession / Presentation / Application (Layers 5–7) → how applications encode, manage, and interpret network dataStudents should understand the distinctions between bits → frames → packets, because these appear in captures.2. Base Network Protocols (the building blocks)IP (Internet Protocol – Layer 3):Core packet-forwarding protocol for IPv4/IPv6.Manages routing across networks.TCP (Transmission Control Protocol):Ensures reliable delivery: sequencing, acknowledgments, error checking, retransmission.Manages connections using ports and a handshake mechanism.UDP (User Datagram Protocol):Connectionless and faster but offers no delivery guarantees.Used when speed and low latency matter more than reliability.ICMP (Internet Control Message Protocol):Sends diagnostic and control messages.Used by tools like ping and traceroute.3. Common Higher-Level Protocols & Security Wrappers (conceptual behaviour)ProtocolPurpose (High-Level)Security-Relevant Behaviours (Conceptual Only)ARPResolves IP → MAC within a LAN.Can be abused conceptually for redirecting traffic.DNSTranslates domain names to IP addresses.Commonly targeted for redirection or misdirection attacks.FTPTransfers files using ports 20/21.Weak configurations may allow unauthorized file movement.HTTP / HTTPSWeb communication.Frequently analysed due to large volume of traffic and vulnerabilities.IRCText-based group chat channels.Historically used in automation and remote coordination systems.SMTPSends email.High-volume traffic channel; relevant for filtering and monitoring.SNMPNetwork device management.Misconfigurations can lead to information disclosure.SSHSecure, encrypted remote terminal access.Important for secure administration.TFTPLightweight file transfer on port 69.Seen in simple or automated device configurations.TLSProvides authentication and encryption for other protocols.Masks traffic contents in both legitimate and illegitimate uses.Key TakeawaysUnderstanding how protocols behave at each OSI layer is essential for interpreting traffic captures.Familiarity with the normal patterns of protocols (IP, TCP/UDP, DNS, TLS, etc.) helps analysts later identify unusual or suspicious activity.This theoretical module prepares students for the practical phase using tools like Wireshark, where they will analyse real traffic captures in a controlled, educational setting.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more12minPlay
November 13, 2025Course 5 - Full Mobile Hacking | Episode 8: Technical Check for Mobile Indicators of Compromise using ADB and Command LineIn this lesson, you’ll learn about:Goal — verifying if an Android device is compromised (conceptual):How investigators look for Indicators of Compromise (IoCs) on a device by inspecting network activity and running processes; emphasis on performing all checks only with explicit authorization and on isolated lab devices.Network‑level indicators:Look for unexpected outbound or long‑lived connections to remote IPs or uncommon ports (examples of suspicious patterns, not how‑to).High‑risk signals include connections to unknown foreign IPs, repeated reconnect attempts, or traffic to ports commonly associated with remote shells/listeners.Correlate network findings with timing (when the connection started) and with other telemetry (battery spikes, data usage) to prioritize investigation.Process & runtime indicators:Unusual processes or services running on the device (unexpected shells, daemons, or package names) are strong red flags.Signs include processes that appear to be interactive shells, packages with strange or obfuscated names, or processes that persist after reboots.Correlate process names with installed package lists and binary locations to determine provenance (signed store app vs. side‑loaded package).Behavioral symptoms to watch for:Sudden battery drain, unexplained data usage, spikes in CPU, or device sluggishness.Unexpected prompts for permissions, new apps appearing without user consent, or developer options/USB debugging enabled unexpectedly.Forensic collection & triage (high level):Capture volatile telemetry (network connections, running processes, recent logs) and preserve evidence with careful documentation (timestamps, commands run, who authorized the collection).Preserve a copy/snapshot of the device state (emulator/VM snapshot or filesystem image) before further analysis to avoid contaminating evidence.Export logs and network captures to an isolated analyst workstation for deeper correlation and timeline building.Correlation & investigation workflow (conceptual):Cross‑reference suspicious outbound connections with running processes and installed packages to identify likely malicious artifacts.Use process metadata (package name, signing certificate, install time) and network metadata (destination domain, ASN, geolocation) to assess intent and scope.Prioritize containment (isolate device/network) if active exfiltration or ongoing C2 is suspected.Containment & remediation guidance:Isolate the device from networks (airplane mode / disconnect) and, where appropriate, block suspicious destinations at the network perimeter.Preserve evidence, then follow a remediation plan: revoke credentials, wipe/restore from a known‑good image, reinstall OS from trusted media, and rotate any secrets that may have been exposed.Report incidents per organizational policy and involve legal/compliance if sensitive data was involved.Safe lab & teaching suggestions:Demonstrate IoCs using emulators or instructor‑controlled devices in an isolated lab network; never create or deploy real malicious payloads.Provide students with sanitized capture files and pre‑built scenarios so they can practice correlation and investigation without touching live systems.Key takeaway:Detecting device compromise relies on correlating suspicious network activity with anomalous processes and device behavior. Always investigate within legal/ethical bounds, preserve evidence, and prioritize containment before remediation.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more12minPlay
November 13, 2025Course 5 - Full Mobile Hacking | Episode 7: Remote Windows Management and Android Geolocation Security TutorialsIn this lesson, you’ll learn about:Remote desktop from Android to Windows — legitimate use & risks (conceptual):What remote desktop access enables: control a Windows desktop from an Android device for administration, support, or productivity (launch apps, browse files).Legitimate configuration concerns: who should be allowed remote access, least‑privilege user selection, and the importance of strong authentication for remote sessions.Security risks from exposed RDP‑like services: brute‑force, credential stuffing, and lateral movement if an attacker obtains access.Secure deployment & hardening of remote desktop services:Prefer VPN / zero‑trust tunnels rather than exposing remote desktop ports to the Internet.Enforce multi‑factor authentication, strong passwords, account whitelisting, and limited session times.Keep host OS patched, limit which users are permitted remote login, and log/monitor remote sessions for anomalies.Social‑engineering data‑harvesting techniques — high‑level awareness (non‑actionable):Why attackers use phishing/cloned sites: to trick users into granting permissions (OAuth consent, file access) or revealing device/browser metadata.Types of data commonly exposed if a user is tricked: browser/user‑agent info, OS details, and location metadata (when permitted by the user).Emphasize: these are high‑level attack categories to defend against, not to implement. No operational steps are provided.Detection signals & forensic indicators for defenders:Unexpected OAuth consent grants or newly‑authorized third‑party apps in user accounts.Unusual outbound connections after a user clicks a link, sudden telemetry reporting (new IPs, device fingerprints), and spikes in geolocation requests.Alerts for new remote sessions from unknown devices, unusual login times, or new client software installs.Retain logs: authorization events, web server access logs, and device telemetry to reconstruct incidents.Mitigations & user education:Train users to verify OAuth consent screens and only grant permissions to known, trusted apps.Disable or tightly control third‑party app authorizations in enterprise accounts; enforce allow‑lists.Use device/endpoint protection (mobile/desktop EDR), network filters, and DNS/TLS inspection to block known phishing/C2 domains.Apply principle of least privilege for remote access and require MFA for all remote desktop logins.Legal, ethical & operational guidance for teaching:Never test phishing or live social‑engineering techniques on real users without explicit, documented consent and institutional approval.Use simulated or injected telemetry in closed lab environments for demonstrations.Follow institutional policies and applicable laws when discussing or demonstrating attacks.Safe classroom exercises & demos:Controlled remote‑access demo: show a remote desktop session using an instructor‑controlled device on an isolated lab network; focus on configuration and logs.OAuth consent analysis: students review benign consent screens and identify risky permission requests.Detection lab: simulate benign telemetry in an isolated environment and have students create detection rules (alerts on new consent grants, unusual geolocation requests).Tabletop IR: run a scenario where a user reports a suspicious consent prompt; students draft containment, evidence collection, and notification steps.Further reading & resources:Enterprise remote‑access hardening guides, OAuth security best practices, phishing awareness curricula, and incident‑response playbooks for handling compromised accounts/devices.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more13minPlay
November 13, 2025Course 5 - Full Mobile Hacking | Episode 6: Ghost Framework: Exploiting Android Devices via Debug Bridge (ADB) and Shodan ReconnaissanceIn this lesson, you’ll learn about:Threat overview — device command‑and‑control via debug interfaces (conceptual):What attacker frameworks that target device debug services aim to achieve (remote control, data exfiltration, persistence).Why debugging interfaces (like Android’s debug bridge) are attractive: powerful access surface, rich device APIs, and potential for high impact if misused.High‑level framework lifecycle (non‑actionable):General stages attackers use conceptually: discovery, access, establish control, maintain access, and post‑compromise actions — explained as theory only, not how‑to.Differences between legitimate management tools (MDM, device management consoles) and malicious C2 frameworks (abuse of management channels).Discovery & reconnaissance (defender mindset):Why exposed management/debug ports on the Internet increase risk and how defenders should treat any externally accessible debug interfaces as critical vulnerabilities.Risk of internet‑facing debug endpoints: automated scanners and crawlers can find exposed services; businesses must not expose debug interfaces publicly.Common post‑compromise capabilities (conceptual):Inventory collection (device metadata), remote process management, filesystem access, sensor/media capture, credential/access checks, and file exfiltration — discussed as categories of impact, not recipes.Emphasize real harms (privacy invasion, surveillance, lateral movement, persistent access).Indicators of compromise (IoCs) & telemetry to monitor:Unexpected remote connections originating from devices to unknown domains or unusual destinations.New or unsigned apps installed, unusual app package names, or apps requesting broad permissions suddenly.Sudden battery drain, spikes in data usage, or unusual CPU load correlated with network activity.Presence of unknown services or long‑running processes, unexpected open ports, and unusual log entries in system logs/logcat.Changes to device configuration (developer mode enabled, USB debugging toggled) without authorized admin action.Forensic artifacts & evidence collection (safe practices):What to collect in an investigation: device inventory, installed package lists and manifests, network connection logs, app data directory listings, and system logs — always under legal authority.Prefer read‑only evidence collection; document chain‑of‑custody; snapshot/emulator capture for lab analysis.Use vendor and platform logging (MDM/Audit logs) to correlate events.Defensive controls & hardening (practical guidance):Disable debug/management interfaces on production devices; permit them only in controlled labs.Block or firewall management ports at network edge — never expose device debug ports to the public Internet.Enforce device enrollment and use MDM to control app installation, restrict sideloading, and enforce app signing policies.Monitor device telemetry and set alerts on anomalous network or power usage patterns.Enforce strong device access controls: screen locks, disk encryption, secure boot where supported, and per‑app permission audits.Keep devices patched and apply vendor security updates promptly.Operational policies & governance:Mandate least privilege for admin keys and rotate management credentials/keys.Use network segmentation for device management systems and require VPN/zero‑trust access to management consoles.Maintain an incident response plan specific to mobile device compromise — include isolation, forensic capture, remediation, and notification steps.Safe lab & teaching recommendations:Teach using emulators and isolated networks only; never scan or connect to internet hosts you don’t own or have explicit permission to test.Provide students with sanitized, instructor‑controlled sample devices/APKs for demonstrations.Use logging/proxy capture in closed labs so students can observe telemetry and detection without causing harm.Require signed authorization for any hands‑on exercises; include ethics and legal briefings before labs.Ethics, legality & disclosure:Unauthorized access is illegal and unethical. Academic settings must enforce rules, require consent, and document authorization for any live testing.Encourage responsible disclosure when vulnerabilities are found in real systems and provide students with resources and templates for reporting.Suggested defensive classroom activities (safe & practical):Manifest and permission review: students analyze benign APK manifests to spot overly broad permissions and propose mitigations.Telemetry detection lab: simulate benign suspicious behavior on an emulator (local-only) and have students build detection rules.Incident response table‑top: walk through a suspected compromised device scenario and practice containment and forensics planning.Policy design exercise: students design an enterprise policy to prevent management interface exposure and outline monitoring/alerting.Further reading & resources:OWASP Mobile Top 10, OWASP MASVS, vendor mobile security guides, MDM best practices, and mobile incident response literature.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more10minPlay
November 13, 2025Course 5 - Full Mobile Hacking | Episode 5: Exploiting Insecure Storage and Access Controls via Reverse Engineering and ADBIn this lesson, you’ll learn about:Access control flaws & exposed debug interfaces: how application components and debug/logging channels can unintentionally reveal sensitive functionality or credentials when accessible from outside the normal UI (e.g., via dev/debug interfaces), and why minimizing exposed surfaces is critical.Log‑based information leakage: why verbose runtime logs (debug logs, stack traces, or logcat output) can leak API credentials or internal activity flows and how logging policies should avoid emitting secrets.Input validation failures enabling file access: the risk when inputs meant for URLs or safe IDs are not validated and are instead used directly to read files or resources—leading to unauthorized access to internal app files or external storage.Reverse‑engineering for source‑level discovery (conceptual): how attackers analyze an app’s distributed package to inspect code paths, SQL queries, and hardcoded secrets; why attackers look for hardcoded credentials, embedded query strings, and sensitive constants in decompiled artifacts. (Discussed at a high level — use only approved analysis tools in controlled labs.)Insecure storage patterns & common pitfalls: typical insecure storage locations and formats that leak secrets:Shared Preferences / XML files: plaintext credentials stored in app-config XMLs.SQLite databases: sensitive tables and records stored without encryption.Temporary files: transient files (temp dumps) that retain secrets on disk.External storage (SD card): writable, world‑readable areas where sensitive data may be exposed to other apps or users.Attack surface demonstrated (high level): combining exposed components, poor input validation, and insecure storage enables an attacker to bypass intended UI controls and access stored credentials or private data — a clear example of failing the “defense in depth” principle.Mitigations & secure design recommendations:Never store credentials or secrets in plaintext; use platform keystores or strong encryption.Validate and strictly sanitize all user‑supplied input before using it in file access or resource locators.Avoid writing sensitive data to external/shared storage; prefer protected internal storage with proper file permissions.Minimize and sanitize logging (do not log secrets or sensitive fields).Harden app components: restrict component exposure, remove debug hooks from production builds, and enforce proper access checks on exported activities/services.Secure databases with encryption-at-rest and limit sensitive columns; avoid temporary files for secret data.Defensive testing & lab guidance:Teach these issues using intentionally vulnerable apps (like DVAR) inside isolated, authorized lab environments only.Instructors should provide sanitized sample APKs and datasets; students must never attempt these techniques against live/production apps or devices without explicit authorization.Emphasize documentation: record findings, reproduce safely, and communicate issues with clear remediation steps for developers.Core takeaway:Effective mobile app security requires careful control of exposed interfaces, strict input validation, and secure handling of all sensitive data (no plaintext secrets, no sensitive external storage). Combining secure coding practices with careful logging, testing, and least‑privilege design prevents the kinds of data exposures highlighted by the DVAR case study.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more13minPlay
November 13, 2025Course 5 - Full Mobile Hacking | Episode 4: Comprehensive Android Debugging and Control: ADB, SCRCPY, and Security ManipulationIn this lesson, you’ll learn about:ADB & SCRCPY — purpose & components (conceptual):What the Android Debug Bridge (ADB) is (a client/daemon/server communication layer) and its role for device management, debugging, and automation in development and incident response.What SCRCPY (screen‑mirror tool) does: mirror and control an Android device screen from a desktop for testing and demonstrations.Common ADB capabilities (overview, non‑actionable):Device enumeration and an interactive device shell as a controlled interface for diagnostics.High‑level categories of system utilities accessible via the shell (activity management, package management, device policies, screen capture) and why they matter for dev, testing, and forensics.Wireless vs. wired connectivity tradeoffs (risk surface of enabling remote ADB/TCP) — conceptual only.System management utilities (what they are & why they’re useful):Activity Manager (am): monitoring app lifecycle and services (useful for debugging and detection).Package Manager (pm): inventorying installed apps, checking app metadata, and assessing potential risk from side‑loaded packages.Device Policy Manager (dpm): obtaining security posture indicators and enforcing enterprise policies.Screen capture utilities: capturing screenshots or video for debugging and evidence collection — emphasise consent and chain‑of‑custody when used for forensics.Screen mirroring & remote control (defensive uses):How mirroring aids usability testing, accessibility demos, and secure classroom demos — and the importance of using it only on devices you control.Security considerations: ensure mirroring is used on isolated networks and trusted hosts to avoid leaking sensitive data.Security risks & hardening recommendations (practical, non‑actionable):Disable USB debugging on production devices; enable only in controlled lab/dev environments.Avoid enabling ADB over TCP on public or untrusted networks; prefer wired/authorized sessions.Enforce ADB authorization (device ↔ host key confirmation) and rotate management keys in enterprise settings.Remove or restrict developer options and sideloading on production/managed devices via MDM.Use device encryption, strong lock screens, and biometrics as an additional layer of defense.Forensic & incident‑response perspective (safe practices):How ADB and related tools can be used legally and ethically for device triage in authorized investigations (collection of logs, capturing screenshots, listing installed packages) — emphasize documentation, consent, and evidentiary chain of custody.Prefer read‑only collection methods and snapshotting (VMs, emulator states) during lab analysis to avoid contaminating evidence.Use instrumented emulators or disposable test devices for any dynamic analysis.Ethics, legality & authorization:Clear rule: do not attempt privilege escalation, device unlocking, or bypassing authentication on devices without explicit, documented authorization from the device owner and appropriate legal clearance.University lab policy suggestions: require signed authorization, isolated networks, and instructor oversight for any hands‑on mobile analysis.Safe classroom exercises & demos:Manifest & package inventory lab: students inspect app manifests and package metadata (provided benign APKs) to spot excessive permissions.Mirroring demo: use SCRCPY to demonstrate UI workflows on an emulator or instructor‑controlled device (network isolated).Telemetry detection lab: generate benign, explainable network traffic from an emulator and have students write detection rules for anomalous behavior (flow volume, unusual destination).Forensics table‑top: present a logged incident and have students draft a triage and evidence‑collection plan that follows legal/ethical best practices.Defender tooling & monitoring (recommended):Mobile endpoint management (MDM/EMM) to enforce policies and control ADB/dev options.Runtime telemetry monitoring (battery, CPU, network) and alerting for anomalous device behavior.Use reputable static analysis tools (e.g., MobSF) and sandboxing for safe APK inspection in labs.Further reading & resources:OWASP Mobile Top 10 and MASVS (Mobile App Security Verification Standard).Official Android docs on ADB and security best practices.Mobile forensics and incident response guides (academic/industry publications).You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more14minPlay
November 13, 2025Course 5 - Full Mobile Hacking | Episode 3: Android Hacking and Remote Management: Payloads, App Hiding, Geolocation, and Data ExtractionIn this lesson, you’ll learn about:Threat model — mobile remote‑control malware (conceptual):What attackers seek from a malicious Android app: persistent remote access, stealth (hide presence), broad permissions (contacts, SMS, storage, mic, camera, location), data exfiltration, and remote command/control.Why mobile malware is impactful: rich sensor/data access, always‑on networks, user trust in apps, and potential financial/privacy harm.Common initial access vectors (high level):Social engineering (phishing, trojanized apps), sideloading (installing outside official stores), malicious web pages, and repackaging legitimate apps.Emphasize that these are high‑level categories — defensive focus is on prevention and detection.Payload capabilities (overview, non‑actionable):Typical capability categories attackers attempt to obtain after compromise: persistence, reconnaissance (contacts, logs), exfiltration (files, messages), location tracking, media capture (mic/camera), command execution, and process/service manipulation.Discuss real impact scenarios (privacy invasion, surveillance, fraud) without operational recipes.Scalable attacker tooling — concept:Explain what device‑management/control frameworks are (legitimate MDM vs. malicious C2 panels) and why an attacker would use them (automation, scale, central management).Distinguish legitimate enterprise MDM workflows from malicious misuse.Indicators of compromise (IoCs) & detection signals:Unusual app permissions (sudden requests for mic/camera/location).Non‑store APK installs, unexpected installed packages, or packages with obfuscated names.Unexpected background network connections to unknown domains or frequent long‑lived sockets.Sudden battery drain, high CPU usage, or unexplained data usage spikes.New services/processes, files, or logs created in app storage directories.Presence of hidden activities or receivers in app manifest (teach students how to read manifests safely).Forensic artifacts & investigation focus (non‑actionable):What to collect and examine: installed package list, app manifest & permissions, network connection logs, logcat output (in controlled lab), file system artifacts in app data, SMS/call logs (with consent), and sensor access timestamps.High‑level static vs dynamic analysis goals: manifest/permission review, metadata, certificate sources (signing), and observing runtime behavior in an isolated environment. No exploitation instructions included.Safe, authorized analysis environments (lab checklist):Use isolated VMs and dedicated test devices or emulators with network isolation (virtual network or proxy).Configure a controlled test network (local-only or captive proxy) and sandboxed analysis tools.Use disposable test accounts and fake/sample data (never real users’ data).Snapshot or revert capability (emulator snapshots, VM snapshots) to restore clean state.Logging and monitoring enabled (network captures, system logs) for teaching demonstrations.Defensive detection & monitoring techniques:Runtime monitoring: monitor unusual outbound connections, anomalous telemetry, high sensor access frequency, and abnormal app lifecycles.Policy controls: disable sideloading, enforce app signing and store policies, use application allow‑lists, and MDM policies for enterprise devices.Endpoint protections: mobile antivirus/ML detection, Play Protect (Android), and behavioural anomaly detection (heuristics on battery/network patterns).Network controls: block connections to suspicious C2 domains, use DNS/HTTP filtering, and inspect TLS metadata for anomalies.Mitigation & hardening best practices:Principle of least privilege: request minimal permissions and use runtime permission prompts responsibly.App store hygiene: vet third‑party stores, enforce code signing & provenance checks.User education: phishing awareness, never install unknown APKs, inspect permissions before granting.Enterprise controls: use MDM/EMM to restrict installation, enforce app vetting, restrict USB/ADB access, and enforce OS updates.Secure development practices: secure coding, minimize sensitive data in storage, encrypt sensitive data, and avoid over‑privileged manifest entries.Defender tools & frameworks (safe, recommended):Static analysis: Mobile security frameworks like MobSF (static/interactive analysis), APKTool (manifest inspection), and decompilers for code inspection in an educational context.Dynamic analysis: use instrumented emulators (isolated), system logging, and network proxies to observe behavior — always in lab setups.Threat intelligence and scanners: commercial and open‑source mobile threat intelligence feeds and sandboxing services for malware scanning.Ethics, legality & responsible disclosure:Legal constraints: unauthorized testing, distribution, or deployment of malware is illegal — only perform hands‑on exercises in controlled, consented labs.Responsible disclosure: how to report findings to vendors or platforms in a safe, ethical manner.Academic lab policy: require signed authorization, lab safety rules, and anonymized datasets when demonstrating real cases.Classroom exercises (safe & practical):Manifest & permission analysis: students inspect benign APK manifests (provided by instructor) and identify suspicious permission combinations.Network telemetry lab: simulate (benign) suspicious traffic from an emulator to a localhost collector and teach detection rules without using malicious payloads.Static metadata analysis: examine sample (non‑malicious) APKs for signing certificate properties, package names, and embedded URLs.Incident response tabletop: present a case study of a suspected compromised device and have students design detection/containment/eradication steps.Use curated, intentionally vulnerable apps (educational samples) that are safe for analysis (e.g., OWASP MobileTop10 labs, purposely vulnerable app projects) — never real malware.Case studies & post‑mortem learning (conceptual):Summaries of well‑documented incidents showing attack chains, what failed, what detection worked, and remediation steps — focus on lessons learned rather than reproducing attack code.Further reading & learning resources:OWASP Mobile Top 10, OWASP MASVS (Mobile Application Security Verification Standard).Mobile forensics textbooks and incident response guides.Academic papers and industry blogs on mobile malware detection, mobile threat intelligence feeds, and responsible diYou can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more10minPlay
November 13, 2025Course 5 - Full Mobile Hacking | Episode 2: Setting Up the iPhone Simulator on Mac OS using Xcode for Mobile Penetration TestingIn this lesson, you’ll learn about:iPhone Simulator on macOS — purpose & use: running a full iOS simulator via Xcode to test, debug, and perform mobile app analysis without physical hardware.Prerequisites: a Mac running macOS and a working installation of Xcode (installed from the App Store; note: large download).Launching the Simulator: open Xcode, load or create a project, then use Xcode → Open Developer Tool → Simulator to start a virtual device.Selecting device & OS: choose device models (e.g., iPhone 12 Pro Max) and iOS system images (e.g., iOS 14.1) from the simulator UI.Basic simulator controls & features: rotate/flip the device, take screenshots, record screen, copy/paste between host and simulator, and manage device snapshots.System navigation & app testing: access Settings, sign in with an Apple ID (if desired), open Safari, browse websites (requires host internet), and launch installed apps for functional testing.Use cases for pentesting & development: quick UI/behavior testing, permission inspection (photos, location, mic, camera), dynamic testing of apps, and preparing for deeper analysis (code/data access, reverse shells, storage inspection) in later modules.Key benefits & limitations: fast, repeatable test environment; no physical device required; good for initial testing and debugging—but some hardware features and exact device behaviors may differ from a real device.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more9minPlay
November 13, 2025Course 5 - Full Mobile Hacking | Episode 1: Android Studio: Running AVDs and Installing Apps on WindowsIn this lesson, you’ll learn about:Setting up Android Studio on Windows:Launching Android Studio (built on IntelliJ) for developing, testing, and examining APKs.Verifying proper installation of the Android SDK to ensure access to essential developer tools.Creating and managing Android Virtual Devices (AVDs):Using the AVD Manager to configure emulators by selecting:Platform type (e.g., Phone)Specific device model (e.g., Pixel 3)System image (e.g., Android 10 / Q)Launching the configured AVD and accessing advanced options via the Extended Controls panel.Customizing emulator settings:Adjusting location (e.g., setting GPS to Singapore).Modifying cellular network type (GSM, LTE) and signal strength.Changing battery level, configuring camera settings, and managing phone functions (SMS, calls).Controlling virtual sensors such as the accelerometer and gyroscope.Saving snapshots, recording emulator screens, and enabling clipboard sharing between Windows and the emulator.Installing and testing APKs using ADB:Downloading an APK (e.g., WhatsApp Messenger) and launching the desired emulator.Using Android Debug Bridge (ADB) for remote device control and configuration:Checking connected devices with adb devices.Installing the APK via adb -s [emulator-name] install [apk-name].Confirming success via the “success” response message.Locating and launching the installed app from Apps & Notifications within the emulator.Key outcome:Gain hands-on experience in emulator setup, configuration, and APK deployment using Android Studio and ADB — essential skills for mobile application testing, debugging, and secure app analysis in a controlled virtual environment.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more11minPlay
November 13, 2025Course 4 - Learning Linux Shell Scripting | Episode 9: Process Management, Scheduling, User Control, and Scripting UtilitiesIn this lesson, you’ll learn about:Process and signal management:Understanding Linux processes and gathering details using ps, top (for CPU-intensive tasks), and pgrep (to find PIDs).Analyzing process attributes such as PID, user, memory usage, and CPU time, and learning to filter and format outputs.Managing processes through signals — terminating with kill (default SIGTERM) or force-stopping using SIGKILL.Implementing custom signal handling in scripts using trap to gracefully manage interrupts like SIGINT (Ctrl+C).System monitoring and communication:Retrieving system details including hostname, kernel version, CPU, and memory stats.Exploring the /proc pseudo-filesystem to access live process data (environment variables, file descriptors, working directories).Sending system-wide messages to logged-in users using wall, or directly writing to a specific user’s terminal under /dev/pts.Scheduling and database interaction:Automating tasks with cron — writing crontab entries (minute, hour, day, month, weekday, command) and setting environment variables.Configuring startup/boot-time commands and verifying background jobs.Interacting with MySQL databases via shell scripts — executing SQL queries using the mysql client, embedding SQL through EOF blocks, and handling structured CSV data using the Internal Field Separator (IFS).User administration and utilities:Building an administrative management script (ADM.sh) to automate user and group operations — adding/removing users (useradd, userdel), modifying shells (chsh), locking/unlocking accounts (usermod -L/-U), setting expirations (chage), and updating passwords.Performing bulk image management with convert (resize by dimension/percentage, format conversion).Taking screenshots using import (whole screen, region, or window capture).Managing multiple terminals using GNU screen — creating, switching, detaching, and reattaching sessions remotely.Key outcome:Develop practical command-line and scripting proficiency for full-scale Linux system administration — covering process control, scheduling, user management, system monitoring, and automation.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more10minPlay
FAQs about CyberCode Academy:How many episodes does CyberCode Academy have?The podcast currently has 212 episodes available.